We found hundreds of local council workers willing to give out login details for government systems without realising.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
Medical practices have special requirements under the Privacy Act, but the security and privacy systems some providers currently have in place may be inadequate.
Preventing problems like Meltdown and Spectre from reocurring requires software developers to be given sufficient information about hardware to ensure security.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
The Productivity Commission’s report on data availability and use is disappointing for consumers, who won't be able to stop firms collecting their data or challenge automated decisions made using it.
You can never be entirely protected from data breaches, but understanding your data is the first step to minimising the risk.
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
There are many ways data can leak from organisations, and as long as companies leave it up to IT to solve, leaks will continue.